Author: Ping Yi

Publications

Publication period start: 2005
Number of co-authors: 5

Co-authors

Number of publications with favourite co-authors
Yue Wu
1
Shiyong Zhang
1
YiPing Zhong
1

Productive Colleagues

Most productive colleagues in number of publications
Shiyong Zhang
1
YiPing Zhong
1
Jianhua Li
3

Publications

Li, Linchun, Li, Jianhua, Wu, Yue, Yi, Ping (2008): A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless S. In: PerCom 2008 - Sixth Annual IEEE International Conference on Pervasive Computing and Communications 17-21 March, 2008, Hong Kong. pp. 324-329. https://doi.ieeecomputersociety.org/10.1109/PERCOM.2008.87

Yi, Ping, Zhang, Shiyong, Zhong, YiPing (2005): An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mob. In: Chen, Chin-Sheng, Filipe, Joaquim, Seruca, Isabel, Cordeiro, José (eds.) ICEIS 2005 - Proceedings of the Seventh International Conference on Enterprise Information Systems May 25-28, 2005, Miami, USA. pp. 220-226.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,124 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,124 designers enjoy our newsletter—sure you don’t want to receive it?